1.1 million SCUF Gaming customer records exposed online due to faulty sever security

Earlier this month, SCUF Gaming, a manufacturer of high-end gaming controllers for PC, Xbox and PS4 announced a security incident that left the personal information more than 1 million customers exposed online. The discovery On April 1, security resear… Continue reading 1.1 million SCUF Gaming customer records exposed online due to faulty sever security

Data Leak: Private information of 14 million Key Ring users exposed

Five misconfigured Amazon Web Services (AWS) S3 buckets revealing private data of Key Ring users were discovered by vpnMentor researchers in January. Like many similar apps, Key Ring lets users store digital copies of their loyalty cards, create a shop… Continue reading Data Leak: Private information of 14 million Key Ring users exposed

Maine Suit Challenges Privacy Regulation on First Amendment Grounds

When it comes to First Amendment free speech rights, the Supreme Court has sided mostly with consumers. Will that change with a Maine case? In 2018, the U.S. Supreme Court struck down a California law that mandated that anti-abortion clinics advise pa… Continue reading Maine Suit Challenges Privacy Regulation on First Amendment Grounds

TrickBot Pushing a 2FA Bypass App to Bank Customers in Germany

Our team is closely monitoring TrickBot’s developing capabilities, including its new cross-channel attacks using the TrickMo component.

The post TrickBot Pushing a 2FA Bypass App to Bank Customers in Germany appeared first on Security Intelligence.

Continue reading TrickBot Pushing a 2FA Bypass App to Bank Customers in Germany

A Proposed New Trust Framework for Physical and Digital Identity Interactions

As we broaden our scope of identity and consider what is required to exchange trusted personal data across physical and digital realms, community interoperability becomes even more important.

The post A Proposed New Trust Framework for Physical and Digital Identity Interactions appeared first on Security Intelligence.

Continue reading A Proposed New Trust Framework for Physical and Digital Identity Interactions

How Retail Security Can Welcome IoT Innovations Without Putting Customers at Risk

As organizations rely more on the IoT to enable internet connection at every part of the retail process, the right mindset can go a long way toward achieving a win-win for retail security.

The post How Retail Security Can Welcome IoT Innovations Without Putting Customers at Risk appeared first on Security Intelligence.

Continue reading How Retail Security Can Welcome IoT Innovations Without Putting Customers at Risk

A Guide to Easy and Effective Threat Modeling

Threat modeling is a process by which potential threats can be identified, enumerated and prioritized, all from a hypothetical attacker’s point of view. Learn more about building a threat model.

The post A Guide to Easy and Effective Threat Modeling appeared first on Security Intelligence.

Continue reading A Guide to Easy and Effective Threat Modeling

Stalkerware Attacks Increased 50 Percent Last Year, Report

Research puts the emerging mobile threat—which monitors the whereabouts and device activity of devices users as well as collects personal data—into clearer focus. Continue reading Stalkerware Attacks Increased 50 Percent Last Year, Report

Scalable Data Protection Is Critical to Support Data Privacy

Organizations are scrambling to figure out the data privacy processes and controls needed to support specific compliance requirements and protect the personal data they store.

The post Scalable Data Protection Is Critical to Support Data Privacy appeared first on Security Intelligence.

Continue reading Scalable Data Protection Is Critical to Support Data Privacy

Municipal Cyberattacks Put Us All at Risk: What Can We Learn From Previous Attacks?

What kinds of state and local government institutions are being targeted by cybercriminals? And what can we learn from recent municipal cyberattacks?

The post Municipal Cyberattacks Put Us All at Risk: What Can We Learn From Previous Attacks? appeared first on Security Intelligence.

Continue reading Municipal Cyberattacks Put Us All at Risk: What Can We Learn From Previous Attacks?